Analysis

  • max time kernel
    97s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    20-04-2021 16:49

General

  • Target

    DocuSign.html

  • Size

    151KB

  • MD5

    9b9ad81357a59408205adf90a0ecfd77

  • SHA1

    dc29234044025144428d9fa5a7b2a7881e7fcd81

  • SHA256

    2d33b98c1750589a3361aaab5533d224f76b2972f6fca27978f09805ae9b8512

  • SHA512

    961ebffffdb0e694cc51ba1831bdb9b3e63ff14b01745f342964974b6b495806f98083586be769d8e795b0f692a22013503129c8feb75ec85fef5e47ebee9250

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\DocuSign.html
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1640
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:2
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1964

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    b2bd1aa1e0e3f0f9158de0702ccfbae9

    SHA1

    4a0a20a24633920e85d7f9e5d1ad559d176bfe07

    SHA256

    d91f38cdf193c776403e279f810275dfb79d0e70adbf8d63f8ac34164881c1da

    SHA512

    9d414478e8f6a2f2aa575af4d57bf41a365e871975ec97341bee3d5a27c95640a7edfcff8ef364e698e6c6c4104cb6f52d0f8f109c5cfeb1b5fd153803693554

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\B3MU91GN.txt
    MD5

    0f8b3444627ff6392723b16b2cff7a9b

    SHA1

    92b8e260512c71b5b2221dd2122e4c906a74be00

    SHA256

    a70c42ee8c7581ed6db8d154d10023b20e8d552bf463f8431383c1f1d5e61fb5

    SHA512

    d9d231e844227dae228a09eb9e120293aaba90eb54d5ad26ee80065fee0f8a9bd1a3de9d4dcda09413461d09279315c33f046a6e768710fc81d9ca980267e9f4

  • memory/1964-60-0x0000000000000000-mapping.dmp